Information Technology Blog

How to Prevent Against “Man-in-the-Middle” Attack

One of the most dangerous aspects of using wireless networks is exposing yourself to what is known as a “man-in-the middle” attack. It is something you’ll want to consider before you send personal information over a free wireless network at a local coffee shop.


It basically works like this: Two parties communicate with each other over a network. A third party, unknown to the other two, intercepts a message, reads it, redirects it to someone else, or changes the content. If successful, all communications between the two parties flow through the attacker's computer without the knowledge of the users themselves.


There are several precautions you can implement to protect yourself from this type of attack.


  • Use a Virtual Private Network (VPN)
  • Limit transactions over wireless networks
  • Keep connection times short
  • Check for the secure connection icon

Click here for more details on each of these precautions.


For more information on Skoda Minotti Technology Partners leave a message below, or contact Tim Heikkila at 440-449-6800.

This entry was posted in Information Technology. Bookmark the permalink. Follow any comments here with the RSS feed for this post. Both comments and trackbacks are currently closed.
© Copyright 2016 Skoda Minotti | Privacy Policy | Disclaimer | Remote Support
Cleveland 440-449-6800 | Akron 330-668-1100 | Tampa 813-288-8826
Website designed and developed by Skoda Minotti Strategic Marketing